Proton blog
- Product updates
- Proton Calendar
- Proton Mail
- Product updates
- Proton Drive
Size limits, quality compression, and privacy concerns can make figuring out how
to share large video files a hassle. Here’s how to do it simply and securely.
Learn the basics of email format, such as subject line, opening paragraph,
sign-off, and signature, with practical tips and examples.
We raised over $1 million this year to directly support organizations on the
front lines of the fight for online privacy and freedom.
- Product updates
- Proton Calendar
- Proton Mail
Preview upcoming updates to Proton Mail and Proton Calendar, including
performance boosts, new features, and enhanced privacy tools.
- Product updates
- Proton Drive
Discover the tools, features, and improvements coming to Proton Drive’s secure
cloud storage and document editor this winter and spring.
- Product updates
- Proton Pass
Take a look at the upcoming features and improvements coming to Proton Pass over
the next several months.
We raised over $1 million this year to directly support organizations on the
front lines of the fight for online privacy and freedom.
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to
win our most exclusive plan and fight for a better internet.
Learn more about our exclusive Pass + SimpleLogin Lifetime offer. Pay once and
enjoy premium password manager features for life.
We searched the dark web for Danish, Dutch, and Luxembourgish politicians’
official email addresses. In Denmark, over 40% had been exposed.
Students modified smart glasses to find someone’s personal data after just
looking at them. This is why we must minimize data collection.
We searched the dark web for Spanish and Italian politicians’ official email
addresses. Compared to other politicians, they’ve had fewer breaches.
Size limits, quality compression, and privacy concerns can make figuring out how
to share large video files a hassle. Here’s how to do it simply and securely.
Learn the basics of email format, such as subject line, opening paragraph,
sign-off, and signature, with practical tips and examples.
- Privacy guides
Learn how an email extractor works, why your email address is valuable, how to
protect your inbox, and what to do if your email address is exposed.
Chinese hackers have compromised US national security by exploiting
government-mandated “backdoors”. The EU should learn from this.
Google is defying the EU Commission and refusing to give people more control
over how they use their Android phones.
Big Tech companies want to chain your passkey to their products. Enter Proton
Pass, which allows you to manage and use passkeys across all devices seamlessly.
SAML and OAuth help your workers access your network securely, but what's the
difference? Here's what you need to know.
Cybersecurity for businesses is harder than ever: find out how zero trust
security can prevent data breaches within your business.
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here
are the top cybersecurity threats we expect companies to face in 2025—and how
Proton Pass can protect your business.